-
1
-
-
84922280902
-
Segmentation-based image copy- move forgery detection scheme
-
March
-
J. Li, X. Li, B. Yang and X. Sun, "Segmentation-Based Image Copy- Move Forgery Detection Scheme," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, March 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.3
, pp. 507-518
-
-
Li, J.1
Li, X.2
Yang, B.3
Sun, X.4
-
2
-
-
84934324709
-
Image forgery detection using adaptive oversegmentation and feature point matching
-
Aug.
-
C. M. Pun, X. C. Yuan and X. L. Bi, "Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, Aug. 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.8
, pp. 1705-1716
-
-
Pun, C.M.1
Yuan, X.C.2
Bi, X.L.3
-
3
-
-
84863325954
-
Passive copy move image forgery detection using undecimated dyadic wavelet transform
-
G. Muhammad, M. Hussain, and G. Bebis, "Passive copy move image forgery detection using undecimated dyadic wavelet transform," Digital Investigation, Elsevier, vol.9, issue 1, pp. 49-57, 2012.
-
(2012)
Digital Investigation, Elsevier
, vol.9
, Issue.1
, pp. 49-57
-
-
Muhammad, G.1
Hussain, M.2
Bebis, G.3
-
4
-
-
84899992554
-
Image forgery detection using steerable pyramid transform and local binary pattern
-
May
-
G. Muhammad, M. H. Al-Hammadi, M. Hussain, and G. Bebis, "Image forgery detection using steerable pyramid transform and local binary pattern," Machine Vision and Applications, vol. 25, no. 4, pp. 985-995, May 2014.
-
(2014)
Machine Vision and Applications
, vol.25
, Issue.4
, pp. 985-995
-
-
Muhammad, G.1
Al-Hammadi, M.H.2
Hussain, M.3
Bebis, G.4
-
5
-
-
85011084631
-
Curvelet transform and local texture based image forgery detection
-
Crete, Greece, July 29-31
-
M. H. Al-Hammadi, G. Muhammad, M. Hussain, and G. Bebis, "Curvelet transform and local texture based image forgery detection," International Symposium on Visual Computing (ISVC'13), Crete, Greece, July 29-31, 2013
-
(2013)
International Symposium on Visual Computing (ISVC'13)
-
-
Al-Hammadi, M.H.1
Muhammad, G.2
Hussain, M.3
Bebis, G.4
-
6
-
-
85011097247
-
-
LNCS 8034
-
G. Bebis et al. (Eds.): ISVC 2013, Part II, LNCS 8034, pp. 503-512, 2013.
-
(2013)
ISVC 2013
, pp. 503-512
-
-
Bebis, G.1
-
8
-
-
84937804974
-
Copy-move image forgery detection based on Gabor magnitude
-
August
-
Jen-Chun Lee, "Copy-move image forgery detection based on Gabor magnitude," Journal of Visual Communication and Image Representation, vol. 31, pp. 320-334, August 2015.
-
(2015)
Journal of Visual Communication and Image Representation
, vol.31
, pp. 320-334
-
-
Lee, J.1
-
10
-
-
80052337449
-
A complete passive blind image copy-move forensics scheme based on compound statistics features
-
F. Peng, Y. Y. Nie and M. Long, "A complete passive blind image copy-move forensics scheme based on compound statistics features," Forensic Science International 212 (2011), pp. e21-e25.
-
(2011)
Forensic Science International
, vol.212
, pp. e21-e25
-
-
Peng, F.1
Nie, Y.Y.2
Long, M.3
-
11
-
-
84878859465
-
Copy-move forgery detection using multiresolution local binary patterns
-
R. Davarzani, K. Yaghmaie, S. Mozaffari, and M. Tapak, "Copy-move forgery detection using multiresolution local binary patterns," Forensics Science International, vol. 231, pp. 61-72, 2013.
-
(2013)
Forensics Science International
, vol.231
, pp. 61-72
-
-
Davarzani, R.1
Yaghmaie, K.2
Mozaffari, S.3
Tapak, M.4
-
12
-
-
84894902017
-
Accurate and robust localization of duplicated region in copy-move image forgery
-
M. Jabery, G. Bebis, M. Hussain, and G. Muhammad, "Accurate and robust localization of duplicated region in copy-move image forgery," Machine Vision and Applications, vpl. 25, pp. 451-475, 2014.
-
(2014)
Machine Vision and Applications, Vpl.
, vol.25
, pp. 451-475
-
-
Jabery, M.1
Bebis, G.2
Hussain, M.3
Muhammad, G.4
-
13
-
-
84878019726
-
Copy-move forgery detection and localization by means of robust clustering with J-Linkage
-
I. Amerini, et al., "Copy-move forgery detection and localization by means of robust clustering with J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.
-
(2013)
Signal Processing: Image Communication
, vol.28
, Issue.6
, pp. 659-669
-
-
Amerini, I.1
-
14
-
-
84947744414
-
A bibliography of pixel-based blind image forgery detection techniques
-
November
-
M. A. Qureshi, and M. Deriche, "A bibliography of pixel-based blind image forgery detection techniques," Signal Processing: Image Communication, vol. 39, part A, pp. 46-74, November 2015.
-
(2015)
Signal Processing: Image Communication
, vol.39
, pp. 46-74
-
-
Qureshi, M.A.1
Deriche, M.2
-
15
-
-
33947167478
-
Face description with local binary patterns: Application to face recognition
-
December
-
T. Ahonen, A. Hadid, and M. Pietikainen, " Face Description with Local Binary Patterns: Application to Face Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, December 2006.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
-
-
Ahonen, T.1
Hadid, A.2
Pietikainen, M.3
-
16
-
-
33745903481
-
Extreme learning machine: Theory and applications
-
G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, "Extreme learning machine: theory and applications," Neurocomputing, vol.70, no. 1-3, pp.489- 501, 2006.
-
(2006)
Neurocomputing
, vol.70
, Issue.1-3
, pp. 489-501
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Siew, C.-K.3
-
17
-
-
84859007933
-
Extreme learning machine for regression and multiclass classification
-
G.-B. Huang, H. Zhou, X. Ding, and R. Zhang, "Extreme learning machine for regression and multiclass classification," IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics, vol. 42, no. 2, pp. 513-529, 2012.
-
(2012)
IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics
, vol.42
, Issue.2
, pp. 513-529
-
-
Huang, G.-B.1
Zhou, H.2
Ding, X.3
Zhang, R.4
-
18
-
-
84864758525
-
Evaluation: From precision, recall and f-factor to ROC, informedness, markedness & correlation
-
D. M. W. Powers, "Evaluation: from precision, recall and f-factor to ROC, informedness, markedness & correlation," J. Machine Learning Tech., vol. 2(1), pp. 37-63, 2011.
-
(2011)
J. Machine Learning Tech.
, vol.2
, Issue.1
, pp. 37-63
-
-
Powers, D.M.W.1
-
19
-
-
84961371043
-
Image tampering detection using noise histogram features
-
J. Fan, T. Chen and J. Cao, "Image tampering detection using noise histogram features," Digital Signal Processing (DSP), 2015 IEEE International Conference on, Singapore, 2015, pp. 1044-1048.
-
(2015)
Digital Signal Processing (DSP), 2015 IEEE International Conference On, Singapore
, pp. 1044-1048
-
-
Fan, J.1
Chen, T.2
Cao, J.3
-
20
-
-
84924598252
-
Effective composite image detection method based on feature inconsistency of image components
-
April
-
W-C. Hu, J-S. Dai, and J-S. Jian, "Effective composite image detection method based on feature inconsistency of image components," Digital Signal Processing, vol. 39, pp. 50-62, April 2015.
-
(2015)
Digital Signal Processing
, vol.39
, pp. 50-62
-
-
Hu, W.-C.1
Dai, J.-S.2
Jian, J.-S.3
|